Last updated:

SPF record missing: what it means and how to fix it

A missing SPF record means any mail server can send email claiming to be from your domain. This is one of the most common reasons emails go to spam, email authentication fails, and domains become vulnerable to spoofing. Without SPF, providers like Google and Microsoft have no way to verify your legitimate emails, hurting both deliverability and trust.

Fix: Add a TXT record at your root domain with the value v=spf1 include:_spf.google.com ~all (replace the include with your email provider). It takes about 2 minutes.
Quick fix Add an SPF record in 2 minutes
  1. Log in to your DNS provider (Cloudflare, Route 53, GoDaddy, Namecheap, or similar).
  2. Go to the DNS records section for your domain.
  3. Add a new TXT record:
  • Host / Name: @ (or leave blank, depending on your provider)
  • Type: TXT
  • Value:
v=spf1 include:_spf.google.com ~all
  • TTL: 3600 (or your provider's default)

Replace include:_spf.google.com with your email provider's SPF include. See the common includes table below for other providers. Once added, most domains start seeing improved email trust within hours.

What is SPF

SPF (Sender Policy Framework) is a DNS TXT record that lists the mail servers authorised to send email on behalf of your domain. When a receiving server gets an email from your domain, it checks the SPF record to verify the sending server is allowed.

Think of SPF as a guest list for your domain's email. Only servers on the list are considered legitimate senders. Anyone not on the list is treated as suspicious.

SPF works alongside DKIM and DMARC to form a three-layer email authentication system. SPF verifies the sending server, DKIM verifies the message integrity, and DMARC ties them together with a policy and reporting. Without SPF, the first layer of that system is missing.

What an SPF record looks like

An SPF record is a TXT entry at your root domain (not a subdomain).

SPF TXT record in DNS
TypeHostValueTTL
TXT @ v=spf1 include:_spf.google.com include:sendgrid.net ~all 3600

Here is an example record with each part explained:

# SPF record breakdown v=spf1 # SPF version (required, must be first) include:_spf.google.com # Allow Google Workspace servers include:sendgrid.net # Allow SendGrid servers ip4:203.0.113.10 # Allow a specific IP address (optional) ~all # Soft fail everything else
Common SPF includes by provider
ProviderSPF include value
Google Workspaceinclude:_spf.google.com
Microsoft 365include:spf.protection.outlook.com
SendGridinclude:sendgrid.net
Mailchimpinclude:servers.mcsv.net
Amazon SESinclude:amazonses.com
Postmarkinclude:spf.mtasv.net
HubSpotinclude:mail.hubspot.net
Zoho Mailinclude:zoho.com
How SPF validation works
Email arrives at the receiving mail server
🔍
DNS lookup: Fetch TXT record at sender's domain
Check sender IP: Is this server listed in the SPF record?
Match found: SPF passes, email is trusted
~
Soft fail (~all): Not listed, flagged as suspicious
Hard fail (-all): Not listed, email rejected

How to think about SPF (simple explanation)

If you are not familiar with DNS or email infrastructure, here is the simplest way to understand SPF:

  • SPF is a whitelist of allowed email senders for your domain, stored in your DNS.
  • If the sending server is on the list, the email is trusted.
  • ~ If the server is not on the list, the email is flagged as suspicious or rejected.
  • If there is no list at all (no SPF record), every server is treated the same, and email providers have to guess.

That guessing is the problem. Without a whitelist, providers like Google and Microsoft cannot tell the difference between your real emails and a spoofed message from an attacker. The result is that your legitimate emails are more likely to end up in spam, and spoofed emails are more likely to reach inboxes.

Without vs with SPF

The difference is straightforward. SPF acts as a whitelist for your domain's email senders.

Without SPF

  • Any server can send email as your domain
  • No way for receivers to verify the sender
  • Higher risk of spoofing and phishing
  • Legitimate emails more likely to land in spam

With SPF

  • Only authorised servers can send email
  • Receivers verify the sender against your DNS
  • Spoofed emails are flagged or rejected
  • Improved deliverability with major providers

Why this matters

Without an SPF record, receiving servers cannot distinguish between legitimate email from your organisation and forged email from an attacker. This creates several problems:

SPF is now a standard requirement for modern email security and is expected by major providers like Google and Microsoft. It is no longer optional for domains that send email.

How to tell if this is your issue

Not sure if a missing SPF record is causing your problem? These are common signs that point to SPF-related email authentication issues:

When this becomes a problem

A missing SPF record does not always cause immediate failures, but the risk grows over time. The impact becomes visible when:

How to fix it properly

Follow these steps to add SPF to your domain and prevent email spoofing at the server level.

Step 1: Identify all services that send email for your domain

Before writing your SPF record, list every service that sends email using your domain name. Common sources include:

Each of these needs to be included in your SPF record. Check the common includes table above for the correct values.

Step 2: Create your SPF record

Combine all your senders into a single TXT record. For example, a domain using Google Workspace and SendGrid:

v=spf1 include:_spf.google.com include:sendgrid.net ~all

The ~all at the end means "soft fail" for any server not on the list. This flags unauthorised senders without outright rejecting them, which is safer while you are still verifying your setup.

Step 3: Add the record to your DNS

Log in to your DNS provider and add a TXT record at the root domain (@) with your SPF value. If your domain has DNS resolution issues, resolve those first, as the SPF record will not be reachable.

Step 4: Verify the record

After adding the record, verify it is live. DNS propagation usually takes a few minutes to a few hours. You can check by running:

dig TXT yourdomain.com

Look for a record starting with v=spf1 in the output. Or use a 1Pane domain health scan to verify.

Step 5: Tighten your policy

Once you have confirmed that all legitimate senders are included and email is flowing correctly, consider changing ~all (soft fail) to -all (hard fail) for stricter enforcement:

v=spf1 include:_spf.google.com include:sendgrid.net -all

Step 6: Set up DMARC

SPF on its own verifies the sending server, but it does not tell email providers what to do when checks fail. Add a DMARC record to define a policy and start receiving reports about your email authentication.

Important: SPF has a limit of 10 DNS lookups. Each include: counts as one lookup, and nested includes within those count too. If you exceed this limit, SPF checks will fail entirely. Consolidate where possible and avoid unnecessary includes.

Common mistakes

How 1Pane detects this

During a domain health scan, 1Pane queries the TXT records at your root domain and looks for a record starting with v=spf1. If none is found, the scan flags SPF as missing. 1Pane also checks for common misconfigurations like +all policies, the 10-lookup limit, and duplicate records.

1Pane checks SPF alongside related issues including missing DMARC records and DNS resolution failures. Changes between scans are tracked, so you can verify that your fix has taken effect.

Frequently asked questions

Do I need SPF if I already have DMARC?

Yes. DMARC does not replace SPF. DMARC defines what happens when authentication fails, but it relies on SPF (and DKIM) to perform the actual checks. Without SPF, DMARC has nothing to enforce on the server verification side. You need both.

Can I have more than one SPF record?

No. Your domain must have exactly one SPF TXT record. If you need to authorise multiple email services, combine them into a single record using multiple include: entries. Having two separate SPF records causes email providers to treat both as invalid.

How long does SPF take to work?

Most DNS changes propagate within a few minutes to a few hours. In rare cases, full global propagation can take up to 48 hours. Once the record is live, email providers will start checking it immediately. If the record is not appearing after several hours, check for DNS resolution issues.

Will adding SPF stop all spam from my domain?

SPF stops unauthorised servers from passing sender verification, but it does not block all types of spoofing on its own. For full protection, combine SPF with DKIM and DMARC. Together, these three protocols cover server verification, message integrity, and policy enforcement.

These domain health issues are closely related to SPF and email authentication:

Scan your domain now to check SPF, DMARC, DNS and SSL in one place.

Scan your domain with 1Pane